the onion router net is most famous and helpful hidden service
add onion pi in cubesat… outernet pleas for russian peoples and mh17 die is guilty putin censorchip
Feel like someone is snooping on you? Browse anonymously anywhere you go with the Onion Pi Tor proxy. This is fun weekend project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi.
Brazilian presents secure router using Raspberry Pi that can be used in demonstrations
The Onion Pi Rev BR is a Brazilian version (enlarged and extra features) of Onion Pi.
Onion pi rev en
While the little Onion original Pi is geared to make anonymous (routing via TOR) connections on a LAN, the Onion Pi Rev BR is larger and has expanded its scope: through an internal battery, sturdy sealed box, and embedded 4G temperature control, it can be placed in a backpack and used as router or access point during an event or public display, for example.
The Brazilian Jose Damico demonstrated in Hope X hacker event in New York, one of his best creations. This is a complete router-based Raspberry Pi project and Onion Pi, the Adafruit.
The router named Onion Pi Rev BR has a unique construction that involves a battery, a circuit overload protection, a source, a 4G modem internal and external antenna, enclosure, the temperature sensor and ethernet and serial interfaces. The Onion Pi connects the Tor anonymizing network, ensuring a safer navigation.
According to Joseph, the internal battery supports 26 hours. In practice it works as a mobile router, ideal for taking on trips and events.
Using it is easy-as-pie. First, plug the Ethernet cable into any Internet provider in your home, work, hotel or conference/event. Next, power up the Pi with the micro USB cable to your laptop or to the wall adapter. The Pi will boot up and create a new secure wireless access point called Onion Pi. Connecting to that access point will automatically route any web browsing from your computer through the anonymizing Tor network.
Who is this good for?
If you want to browse anonymously on a netbook, tablet, phone, or other mobile or console device that cannot run Tor and does not have an Ethernet connection. If you do not want to or cannot install Tor on your work laptop or loan computer. If you have a guest or friend who wants to use Tor but doesn’t have the ability or time to run Tor on their computer, this gift will make the first step much easier.
What is Tor?
Tor is an onion routing service - every internet packet goes through 3 layers of relays before going to your destination. This makes it much harder for the server you are accessing (or anyone snooping on your Internet use) to figure out who you are and where you are coming from. It is an excellent way to allow people who are blocked from accessing websites to get around those restritions.
According to the Tor website:
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company’s patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.